Добірка наукової літератури з теми "Authentication method"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Authentication method".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Authentication method"
Nahtigal, Tomaž, and Andrej Žemva. "Block–wise authentication method for digital images." Journal of Electrical Engineering 63, no. 5 (November 1, 2012): 289–95. http://dx.doi.org/10.2478/v10187-012-0042-6.
Повний текст джерелаPark, Hosung, Seungsoo Nam, and Daeseon Choi. "Address Authentication Method for Sustainable Social Qualification." Sustainability 12, no. 5 (February 25, 2020): 1700. http://dx.doi.org/10.3390/su12051700.
Повний текст джерелаLoginovskiy, O. V., M. E. Koval, and A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.
Повний текст джерелаYakovlev, V. "Method for Authentication of Diffie ‒ Hellman Values Based on Pre-Distributed Random Sequences and Wegman ‒ Carter One-Time Pad Algorithm." Proceedings of Telecommunication Universities 7, no. 3 (October 6, 2021): 79–90. http://dx.doi.org/10.31854/1813-324x-2021-7-3-79-90.
Повний текст джерелаPagnin, Elena, and Aikaterini Mitrokotsa. "Privacy-Preserving Biometric Authentication: Challenges and Directions." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7129505.
Повний текст джерелаSong, Yubo, Bing Chen, Tianqi Wu, Tianyu Zheng, Hongyuan Chen, and Junbo Wang. "Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information." Wireless Communications and Mobile Computing 2021 (November 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/2993019.
Повний текст джерелаLiu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.
Повний текст джерелаPutri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (June 3, 2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.
Повний текст джерелаLipton, David. "Logical authentication method." ACM SIGSAC Review 4, no. 2 (April 1986): 9–20. http://dx.doi.org/10.1145/15842.15845.
Повний текст джерелаHwang, Ho Bin, Hyeokchan Kwon, Byungho Chung, Jongshill Lee, and In Young Kim. "ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions." Sensors 21, no. 21 (October 20, 2021): 6966. http://dx.doi.org/10.3390/s21216966.
Повний текст джерелаДисертації з теми "Authentication method"
Bani-Hani, Raed M. "Enhancing the IKE preshared key authentication method." Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/4406.
Повний текст джерелаThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 31, 2007) Includes bibliographical references.
Tellini, Niklas, and Fredrik Vargas. "Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097.
Повний текст джерелаTvåfaktorsautentisering (2FA) är en tvåstegs verifieringsprocess som syftar att ge en extra nivå av säkerhet, i och med att den kräver användaren att autentisera sig själv genom en sekundär faktor (något man äger eller har ärvt). Utan användning av 2FA, kan en förövare få åtkomst till en persons mobila enhet eller konto endast genom att kunna offrets lösenord. Att enbart kunna lösenordet är inte tillräckligt för att en autentiseringsprocess ska vara godkänd om 2FA är implementerad. I det här projektet analyseras olika 2FA som skulle kunna implementeras av en digital utvärderingsplattform. Sådana plattformar förvandlar tester och prov till digitalt innehåll och kräver därför en säker autentisering. Dessutom är det viktigt att säkra lärarnas konton för att undvika att icke auktoriserade personer loggar in på deras konton. Vi undersöker hur 2FA kan användas för att lägga till en extra nivå av säkerhet på lärarnas konton, med fokus på kostnad, användarupplevelse, lättanvändlighet och utplacering av lösningen. Vi kom fram till att 2FA via en faktor man äger är en passande metod och vi implementerade sedan en lösning grundad på engångslösenord. Detta projekt kan förhoppningsvis vara till förmån för digitala utvärderingsplattformar som vill implementera 2FA, genom att ge en bredare kunskap inom detta område. Projektet skulle kunna gynna allmänheten genom att bidra till ökad generell kunskap om 2FA, och därav leda till säkrare tjänster.
OLSSON, JOAKIM. "Method for gesture based authentication in physical access control." Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.
Повний текст джерелаASSA Abloy is the largest global supplier of intelligent locks and security solutions. The company constantly strives to develop new and innovative solutions for physical access control. One concept the company wanted to investigate aimed to allow the user to effortlessly unlock a door using gestures, resulting in a seamless experience. The idea was to use a wearable as a credential device and identifying the user gestures with the sensors supplied by the wearable. The gesture used in this thesis project were knocks, meaning that the user unlocks the door by knocking on it. The main objective of this thesis project was to develop a system allowing knocks to be used as a method of authentication and evaluate the system based on system security and user convenience. The system developed consists of two accelerometer sensors; one located in the wearable and one located in the lock/door. The signals from each sensor are processed and analyzed to detect knocks. The time correlation between the knocks detected by each sensor are analyzed to verify that they originate from the same user. A theoretical model of the system was developed to facilitate the evaluation of the system. The evaluation of the system showed that both the system security and the user continence attained satisfying values. This thesis shows that the concept has high potential but further work is needed. The framework of methods used to evaluate the system in this thesis can in the same way be used to evaluate systems during any further work.
Dasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.
Повний текст джерелаLanglotz, Benjamin. "Usable Security : A seamless user authentication method using NFC and Bluetooth." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297835.
Повний текст джерелаCetin, Cagri. "Design, Testing and Implementation of a New Authentication Method Using Multiple Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5660.
Повний текст джерелаTorres, Peralta Raquel. "Recognizing User Identity by Touch on Tabletop Displays: An Interactive Authentication Method." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265555.
Повний текст джерелаCordeiro, Raposo Fernando. "Chromatographic studies of major milk proteins : towards a reliable method for the assessment of milk authentication." Thesis, University of the West of England, Bristol, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.275891.
Повний текст джерелаMendoza, Patricia A. "An enhanced method for the existing bluetooth pairing protocol to avoid impersonation attacks." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Повний текст джерелаMarnell, Joseph. "An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access Environments." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/970.
Повний текст джерелаКниги з теми "Authentication method"
Schuckers, Michael E. Computational Methods in Biometric Authentication. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-202-5.
Повний текст джерелаSchuckers, Michael E. Computational methods in biometric authentication: Statistical methods for performance evaluation. London: Springer, 2010.
Знайти повний текст джерелаHe tong shen cha de jie gou yu fang fa: Qi ye he tong shen cha zhi yin = A guide to corporate contract review : its structure and methods. Beijing Shi: Fa lü chu ban she, 2009.
Знайти повний текст джерелаservice), SpringerLink (Online, ed. Characterization and Authentication of Olive and Other Vegetable Oils: New Analytical Methods. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Знайти повний текст джерелаNational Information Standards Organization (U.S.). Ranking authentication and access methods available to the metasearch environment: A recommended practice of the National Information Standards Organization. Bethesda, MD: National Information Standards Organization, 2006.
Знайти повний текст джерелаGacovski, Zoran. Biometrics Authentication Methods. Arcler Education Inc, 2019.
Знайти повний текст джерелаGacovski, Zoran. Biometrics Authentication Methods. Arcler Education Inc, 2019.
Знайти повний текст джерелаR, Ashurst P., and Dennis M. J, eds. Analytical methods of food authentication. London: Blackie Academic & Professional, 1998.
Знайти повний текст джерелаSchuckers, Michael E. Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation. Springer London, Limited, 2012.
Знайти повний текст джерелаBoonkrong, Sirapat. Authentication and Access Control: Practical Cryptography Methods and Tools. Apress L. P., 2020.
Знайти повний текст джерелаЧастини книг з теми "Authentication method"
Tapiador, Marino, and Juan A. Sigüenza. "Writer Identification Method Based on Forensic Knowledge." In Biometric Authentication, 555–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_76.
Повний текст джерелаManolova, Agata, Nikolay Neshov, Stanislav Panev, and Krasimir Tonchev. "Facial Expression Classification Using Supervised Descent Method Combined With PCA and SVM." In Biometric Authentication, 165–75. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_13.
Повний текст джерелаShin, Dongjoe, and Jaihie Kim. "Point to Point Calibration Method of Structured Light for Facial Data Reconstruction." In Biometric Authentication, 200–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_28.
Повний текст джерелаChen, Jie, Shiguang Shan, Peng Yang, Shengye Yan, Xilin Chen, and Wen Gao. "Novel Face Detection Method Based on Gabor Features." In Advances in Biometric Person Authentication, 90–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_11.
Повний текст джерелаCui, Jiali, Tieniu Tan, Xinwen Hou, Yunhong Wang, and Zhuoshi Wei. "An Iris Detection Method Based on Structure Information." In Advances in Biometric Person Authentication, 157–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947_20.
Повний текст джерелаGuo, Yucong, Xingming Zhang, Huangyuan Zhan, and Jing Song. "A Novel Illumination Normalization Method for Face Recognition." In Advances in Biometric Person Authentication, 23–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947_4.
Повний текст джерелаZhang, Hongwei, Yilong Yin, and Guozhen Ren. "An Improved Method for Singularity Detection of Fingerprint Images." In Advances in Biometric Person Authentication, 516–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_58.
Повний текст джерелаGuo, Hui, Chengming Liu, and Liming Zhang. "An Automatic Method of Building 3D Morphable Face Model." In Advances in Biometric Person Authentication, 50–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947_7.
Повний текст джерелаAlmeida, Miguel. "Authentication: Choosing a Method That Fits." In Web Application Security, 15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_8.
Повний текст джерелаXia, Liang, Yongjian Yang, and Yong Wang. "A Method of Evaluating Authentication Mechanisms." In Innovations and Advances in Computer Sciences and Engineering, 179–84. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_31.
Повний текст джерелаТези доповідей конференцій з теми "Authentication method"
Morii, Michitomo, Hiroki Tanioka, Kenji Ohira, Masahiko Sano, Yosuke Seki, Kenji Matsuura, and Tetsushi Ueta. "Research on Integrated Authentication Using Passwordless Authentication Method." In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.198.
Повний текст джерелаSuzuki, Hiroyuki, Hiroki Hayashi, Takashi Obi, Nagaaki Ohyama, and Takashi Komuro. "Improvement on pattern matching method for hand-waving finger vein authentication." In JSAP-OSA Joint Symposia. Washington, D.C.: Optica Publishing Group, 2017. http://dx.doi.org/10.1364/jsap.2017.6p_a409_4.
Повний текст джерелаHe, Jackson Duanfeng, and Eugene Joseph. "Automatic Authentication Method and Scanner." In 2007 IEEE Workshop on Automatic Identification Advanced Technologies. IEEE, 2007. http://dx.doi.org/10.1109/autoid.2007.380612.
Повний текст джерелаAlasheev, V. V., E. G. Balenko, A. S. Kuzmenko, and V. H. Fedorov. "Radio Network Subscriber Authentication Method." In 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon). IEEE, 2020. http://dx.doi.org/10.1109/fareastcon50210.2020.9271493.
Повний текст джерелаChoi, Yunyeong, Jungwon Lee, Hyungsoon Shin, and Wookyung Sun. "Mutual authentication method between PUFs." In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2022. http://dx.doi.org/10.1109/icecet55527.2022.9873480.
Повний текст джерелаBandyopadhyay, Samir Kumar. "A Method for Signature Authentication Scheme." In 2011 International Conference on Ubiquitious Computing and Multimedia Applications (UCMA). IEEE, 2011. http://dx.doi.org/10.1109/ucma.2011.18.
Повний текст джерелаZujevs, Nikita. "Authentication by Graphical Passwords Method ‘Hope’." In 2019 International Conference on Computing, Electronics & Communications Engineering (iCCECE). IEEE, 2019. http://dx.doi.org/10.1109/iccece46942.2019.8941758.
Повний текст джерелаZolotukhin, Oleh, and Maryna Kudryavtseva. "Authentication Method in Contactless Payment Systems." In 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2018. http://dx.doi.org/10.1109/infocommst.2018.8632065.
Повний текст джерелаHe, Fangming, Wei Wang, and Hong Man. "REAM: RAKE receiver enhanced authentication method." In MILCOM 2010 - 2010 IEEE Military Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/milcom.2010.5680394.
Повний текст джерелаLi, Xinghua, Weidong Yang, SangJae Moon, and Jianfeng Ma. "Authentication Method for 802.11S Infrastructure Mode." In 2006 First International Conference on Communications and Networking in China. IEEE, 2006. http://dx.doi.org/10.1109/chinacom.2006.344829.
Повний текст джерелаЗвіти організацій з теми "Authentication method"
Jones, M., P. Hunt, and A. Nadalin. Authentication Method Reference Values. RFC Editor, June 2017. http://dx.doi.org/10.17487/rfc8176.
Повний текст джерелаCam-Winget, N., D. McGrew, J. Salowey, and H. Zhou. The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST). RFC Editor, May 2007. http://dx.doi.org/10.17487/rfc4851.
Повний текст джерелаVesely, A. DNS Whitelist (DNSWL) Email Authentication Method Extension. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8904.
Повний текст джерелаArkko, J., and H. Haverinen. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4187.
Повний текст джерелаVanderveen, M., and H. Soliman. Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE). RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4763.
Повний текст джерелаArkko, J., V. Lehtovirta, and P. Eronen. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA'). RFC Editor, May 2009. http://dx.doi.org/10.17487/rfc5448.
Повний текст джерелаMcMahon, P. GSS-API Authentication Method for SOCKS Version 5. RFC Editor, June 1996. http://dx.doi.org/10.17487/rfc1961.
Повний текст джерелаArkko, J., V. Lehtovirta, V. Torvinen, and P. Eronen. Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA'). RFC Editor, October 2021. http://dx.doi.org/10.17487/rfc9048.
Повний текст джерелаStanley, D., J. Walker, and B. Aboba. Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs. RFC Editor, March 2005. http://dx.doi.org/10.17487/rfc4017.
Повний текст джерелаClancy, T., and H. Tschofenig. Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method. RFC Editor, February 2009. http://dx.doi.org/10.17487/rfc5433.
Повний текст джерела